I am studying network security and want to understand how attackers use DNS poisoning to compromise web applications. My questions are:
- How does DNS spoofing work in real-world attacks?
- How attackers exploit cache poisoning to redirect traffic.
- What defensive measures can prevent DNS hijacking.
Any practical examples or mitigation techniques would be valuable.